Clarifying Privacy in the Clouds
暂无分享,去创建一个
[1] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[2] Richard L. Bernacchi,et al. Computer Law , 1986 .
[3] J. Rubenfeld. The Right of Privacy , 1989 .
[4] Mark Perry,et al. Going for the throat: Carnivore in an Echelon World1 - Part I , 2003, Comput. Law Secur. Rev..
[5] Ayman I. Kayssi,et al. Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[6] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[7] Acronyms. A. C. R. , 2012 .
[8] H. Elsheshtawy,et al. Personal Information Protection and Electronic Documents Act , 2015 .
[9] Mark Perry,et al. Going for the Throat with Precision Surveillance , 2004 .
[10] Thomas Plant. Municipal Freedom of Information and Protection of Privacy Act, 1989: Organizational Change in the Region of Hamilton-Wentworth , 1991 .
[11] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.